Flax Typhoon's ArcGIS Backdoor: Why EDR Failed and How NDR Finds the Webshell
Back to top
October 30, 2025
Flax Typhoon's ArcGIS Backdoor: Why EDR Failed and How NDR Finds the Webshell
According to a new report from Reliaquest, the China-backed advanced persistent threat (APT) group Flax Typhoon, also known as Ethereal Panda (Crowdstrike) and RedJuliett (Recorded Future), maintained year-long access to an ArcGIS system by turning trusted software into a persistent backdoor.
This attack did not exploit an unpatched vulnerability; instead, the attackers executed an act of camouflage, turning the victim’s own tools against them to establish cyber espionage and long-term, persistent access.
How Flax Typhoon Weaponized Trust
The reason this espionage campaign succeeded for over a year is simple: Flax Typhoon weaponized the concept of trust. They employed techniques known as Living-Off-The-Land (LotL) to make their spy software look like essential business infrastructure.
The Evasion of Endpoint and Log-Based Tools
The attackers successfully bypassed both endpoint detection and response (EDR) and avoided generating alerts within the security information and event management (SIEM) tool by corrupting a legitimate application file: a Java Server Object Extension (SOE) belonging to the ArcGIS Server.
The attackers modified the SOE’s code to function as a stealthy web shell that accepted remote base64-encoded commands via the public-facing REST interface.
[Call-out] When EDR tools see a vendor-signed file running normally and the SIEM processes logs from a trusted, approved application, security tools register the activity as expected behavior, effectively granting the hackers a free pass for their initial command execution.
After gaining initial access through the administrator credentials, the adversary leveraged the compromised SOE (webshell) for execution, immediately running reconnaissance commands, mapping the internal network, and targeting IT staff workstations for credential harvesting.
The Invisible Command Center
To maintain remote control after gaining the initial foothold, the hackers went further, expertly disguising their communication channel as routine network activity.
For persistent Command-and-Control (C2), the adversary installed the legitimate SoftEther VPN client. They often renamed the executable, using naming conventions like bridge.exe, and placed it in the highly trusted Windows System32 directory to masquerade it as a normal system process.
In these instances, the command-and-control (C2) traffic remains undetected because it is routed as VPN-over-HTTPS on the standard web port (443). Firewalls and monitoring tools, expecting benign web traffic, fail to recognize that a persistent, covert, and proprietary network tunnel is hiding inside that encryption layer.
A Long-Term Foothold
Flax Typhoon’s persistence plan defeated the victim’s internal recovery strategy and to lock out any potential rivals.
To ensure exclusive control, they established a hard-coded key within the webshell, preventing other threat actors, or internal administrators, from tampering with their access. Because the corrupted SOE was part of the core installation, the malicious code remained in the victim’s routine system backups. This meant the organization’s own recovery procedure became the hacker’s re-infection mechanism, guaranteeing persistent access regardless of system restoration efforts.
The methods Flax Typhoon used are part of a growing trend among nation state adversaries that attempt to compromise the supply chain.
For instance, the ArcaneDoor campaign that targeted Cisco ASA devices also involved manipulating low-level firmware for persistence. Similarly, Volt Typhoon systematically used LotL techniques to hide within critical infrastructure, exploiting legitimate Windows binaries and network tunnels to avoid detection.
MITRE ATT&CK TTPs
| ID | Tactics and Techniques | 
|---|---|
| T1078 | Initial Access: Valid Accounts | 
| T1190 | Exploit Public-Facing Application | 
| T1059.001 | Execution: Command and Scripting Interpreter: PowerShell | 
| T1059.003 | Execution: Command and Scripting Interpreter: Windows Command Shell | 
| T1087.001 | Discovery: Account Discovery: Local Account | 
| T1543.003 | Persistence: Create or Modify System Processes: Windows Services | 
| T1036.005 | Defense Evasion: Masquerading: Rename Legitimate Utilities | 
| T1564-001 | Defense Evasion: Hide Artifacts: Hidden Files and Directories | 
| T1071.001 | Command and Control: Application Layer Protocol Web Protocols | 
| T1043 | Command and Control: Commonly Used Port | 
| T1003.002 | Credential Access: Security Account Manger | 
| T1003 | Credential Access: OS Credential Dumping | 
Indicators of Compromise
| Artifact | Details | 
|---|---|
| 172.86.117[.]230 | C2 IP (SoftEther VPN Server) | 
| bridge.exe | Renamed SoftEther VPN Bridge | 
| vpn_bridge.config | SoftEther VPN Config File | 
| hamcore.se2 | SoftEther Installation File | 
| 4f9d9a6cba88832fcb7cfb845472b63ff15cb9b417f4f02cb8086552c19ceffc | File hash of bridge.exe | 
| 8282c5a177790422769b58b60704957286edb63a53a49a8f95cfa1accf53c861 | File hash of vpn_bridge.config | 
| 84959fe39d655a9426b58b4d8c5ec1e038af932461ca85916d7adeed299de1b3 | File hash of hamcore.se2 | 
| cec625f70d2816c85b1c6b3b449e4a84a5da432b75a99e9efa9acd6b9870b336 | File hash of simplerestsoe.soe | 
Building Resilience with Network Detection and Response (NDR)
Detecting modern advanced persistent threats (APTs) means shifting the security focus from what is on the host (files/logs) to how the host behaves on the network. This behavior is precisely where LOTL threats, like the Flax Typhoon webshell, betray their malicious intent. The ExtraHop NDR platform is engineered to expose these stealthy LotL techniques by monitoring the core network activities that firewalls and EDR might fail to log or detect.
Detection of Covert C2 Tunnels
ExtraHop uses advanced behavioral analysis and machine learning to profile expected traffic patterns. It instantly detects anomalies such as a geo-mapping server suddenly initiating a persistent, non-browser-based VPN tunnel over HTTPS (SoftEther), exposing the structural anomalies that firewalls ignore.
Lateral Movement Visibility
Once inside, the adversary attempts to move laterally and hunt for credentials. ExtraHop provides full east-west visibility by decoding encrypted protocols like Kerberos, NTLM, and MSRPC. This allows the platform to flag unauthorized reconnaissance or connections from a compromised ArcGIS server to IT staff workstations, including network service scanning used to map the internal environment.
Identity-Driven Alerting
ExtraHop correlates all anomalous network activity back to the compromised administrator account used for initial access. This allows security teams to rapidly pivot from "suspicious traffic" to "Compromised ArcGIS Admin Account activity," shrinking the Mean Time To Respond (MTTR) and enabling surgical isolation of the threat actor.
Shift Defense to the Network
The Flax Typhoon attack delivers a clear message: Building defenses around a security perimeter is a failing strategy. Organizations’ EDR and SIEM tools will likely miss threats when the adversary's primary weapon is your own trusted application code. Building cyber resilience requires shifting defense to the network itself.
By detecting the consequences of a compromise, including covert C2 tunnels, suspicious encrypted traffic flows, and unauthorized lateral movement, ExtraHop helps to ensure that even if a valid account is breached, the attacker's activities are immediately exposed. In an era where every major enterprise is a target, NDR is the foundational requirement for continuous threat hunting and eviction, helping organizations observe, stop, and permanently remove the spies hiding within your systems.
Discover more

Product Marketing Team
Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant. Zuckerman’s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, sandbox, deception technology, cloud access security brokers (CASB), SASE, data loss prevention (DLP), user and entity behavior analytics (UEBA), Network detection and response (NDR), and encryption.







